Blog

Information Strategy Design (ISD) has officially joined forces with Atlanta based MSP, Medicus IT effective January 17th, 2019. By uniting these two healthcare-focused Managed Service Providers, the combined Medicus IT (MIT) organization is now one of the largest healthcare-focused MSPs in the nation.

As you may be aware, the United States announced a series of tariffs on goods and materials manufactured in China. A majority of the electronics and hardware that are essential to the technology industry will be affected by these tariffs. Starting on September 24th, 2018 the US implemented a 10% tariff and on January 1st, 2019 they were planned to go up to 25%, although this has been recently postponed for 90 days while the US and China renegotiate.

The word “hacker” conjures up an image of a hoodie-wearing basement dweller that programs all sorts of malicious attacks to infiltrate their target’s computer. But hackers are so much more than that. There are also hackers that use their skills to do good.

Should you migrate to the cloud or virtualize your server? Both approaches have benefits, but figuring out which one is right for your organization is another story. If you’re having trouble deciding which technology is the best choice for the future of your business, this article will help you figure it out.

Voice over Internet Protocol (VoIP) is changing the way small- and medium-sized businesses (SMBs) communicate. That’s why many SMBs are now switching to this affordable yet feature-rich phone system. But before you decide to invest, make sure your VoIP distributor is a reputable one.

Cloud computing marketing can be deceiving. When you see an image of the cloud, it’s often a happy, bubbly, white puffball floating delightfully in front of a blue sky background. Its presence is both calming and reassuring, which makes you believe that anything is possible.

Business owners stand to gain from learning emerging IT trends. In the case of containers, it’s an opportunity to reduce costs, increase hardware efficiency, and improve data security. One of the best ways to learn about containers is to address the misconceptions about them.

Eavesdropping has recently been making headlines, but this form of cyberattack has been around for years. Cybercriminals have been listening in on VoIP phone calls since the tech was introduced to the market, and they show no sign of stopping their malicious activities anytime soon.